2009
DOI: 10.1007/s11235-009-9243-0
|View full text |Cite
|
Sign up to set email alerts
|

Conception approach of access control in heterogeneous information systems using UML

Abstract: The development of the information systems should answer more and more to the problems of federated data sources and the problems with the heterogeneous distributed information systems. The assurance of data access security realized in the cooperative information systems with loose connection among local data sources is hard to achieve mainly for two reasons: the local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and the local autonomy of systems does not allow to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Role-based access control approach [1] or its extensions [7,8] requires the identification of roles in a system. The role is properly viewed as a semantic structure around which the access control policy is formulated.…”
Section: Access Control Based On Role and Usage Conceptsmentioning
confidence: 99%
See 2 more Smart Citations
“…Role-based access control approach [1] or its extensions [7,8] requires the identification of roles in a system. The role is properly viewed as a semantic structure around which the access control policy is formulated.…”
Section: Access Control Based On Role and Usage Conceptsmentioning
confidence: 99%
“…The constraints can be defined for each main element of the model presented above (i.e user, group, subject, session, role, function, permission, object and method), and also for the relationships among the elements. The concept of constraints was described widely in the literature [3,8,11,13]. It is possible to distinguish different types of constraints, static and dynamic, that can be attached to different model elements.…”
Section: Approach Of Role Based Access Control With Usage Controlmentioning
confidence: 99%
See 1 more Smart Citation
“…The constraints can be defined for each main element of the model presented above (i.e user, group, subject, session, role, function, permission, object and method), and also for the relationships among the elements. The concept of constraints was described widely in the literature [5,6,13,14,16]. It is possible to distinguish different types of constraints, static and dynamic, that can be attached to different model elements.…”
Section: Access Control Approach For Dynamic Information Systemsmentioning
confidence: 99%